Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
662dc9ad67109d3dae66251b8a42fc08.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
662dc9ad67109d3dae66251b8a42fc08.dll
Resource
win10v2004-20231222-en
General
-
Target
662dc9ad67109d3dae66251b8a42fc08.dll
-
Size
91KB
-
MD5
662dc9ad67109d3dae66251b8a42fc08
-
SHA1
3a1ad09c40fa0b3160ed2c8971005ec825eeabed
-
SHA256
0299e4f365c1cae768a410d5a4e8d5d3c95a81b728a369fa8fa9a817af729a00
-
SHA512
41dfb7e10fae4f1b635c9290c615f7e662c3eefd1e61005e5c686e8dd145e3d5de0716cdeedbbade33dabc3ee9c3349e2688d48d4ba4b6353e9b9baeb8bfa3de
-
SSDEEP
1536:1UKQFTIohTcdh5jPPIEtvO1FyVRTE+R3u447vss7PMSYhuLCCCb:1UBFMohTc9jQEtG1FwmayLLSuA
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1664 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\HookHelp.sys rundll32.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1664 2372 rundll32.exe 16 PID 2372 wrote to memory of 1664 2372 rundll32.exe 16 PID 2372 wrote to memory of 1664 2372 rundll32.exe 16 PID 2372 wrote to memory of 1664 2372 rundll32.exe 16 PID 2372 wrote to memory of 1664 2372 rundll32.exe 16 PID 2372 wrote to memory of 1664 2372 rundll32.exe 16 PID 2372 wrote to memory of 1664 2372 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\662dc9ad67109d3dae66251b8a42fc08.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\662dc9ad67109d3dae66251b8a42fc08.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
PID:1664
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD572bbfa8d5d7ba7d51d3d5673be9453d4
SHA19dbba73487144192cccc09b5242e3cf892795779
SHA2562908aad5e1def4298d65635074c0fe274142d74a67209ef22f7ecde423b2cda6
SHA512306b8fb472ddf6415d163195499a049f75e599e403ae02317cc3c2467364b0f9253c52640626dc446360d3f3d1bd7a8513585d4367fe21816ea3a2f86281f5d5
-
Filesize
60B
MD5a764045c1199b36daa0811698ce1f92b
SHA19f367bac911d786b9d44e52585cb71afb24e7967
SHA2565bee6dee7219fe42b556542a3fdec752f259c5375ccdf02f6fdef07ce5e07d52
SHA512444fb66a75a5695127f881c6fb98920769e562213c7a9700af1d79eabd3753609b9caf787ad4c06bac9d72d0eaff40d32073fb368d104d787c06c78aaa6ecf10